2021
DOI: 10.1155/2021/6646445
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Hierarchical and Time-Sensitive Data Sharing with User Revocation in Mobile Crowdsensing

Abstract: Recently, cloud-based mobile crowdsensing (MCS) has developed into a promising paradigm which can provide convenient data sensing, collection, storage, and sharing services for resource-constrained terminates. Nevertheless, it also inflicts many security concerns such as illegal access toward user secret and privacy. To protect shared data against unauthorized accesses, many studies on Ciphertext-Policy Attribute-Based Encryption (CP-ABE) have been proposed to achieve data sharing granularity. However, providi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2022
2022
2023
2023

Publication Types

Select...
4
1
1

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 43 publications
0
5
0
Order By: Relevance
“…In the research field of data access control, CP-ABE [10], [11], [12], [48], [49], [50] is widely accepted in various data sharing scenario in honest-but-curious public data storage, such as cloud data sharing, to achieve data confidentiality and fine-grained access control. Although CP-ABE is a effective and helpful tool in data security, its heavy overhead in computation of encryption and decryption is still undesirable in many applications.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…In the research field of data access control, CP-ABE [10], [11], [12], [48], [49], [50] is widely accepted in various data sharing scenario in honest-but-curious public data storage, such as cloud data sharing, to achieve data confidentiality and fine-grained access control. Although CP-ABE is a effective and helpful tool in data security, its heavy overhead in computation of encryption and decryption is still undesirable in many applications.…”
Section: Related Workmentioning
confidence: 99%
“…To evaluate the time and storage cost in encryption, l (row number of access policy) is ranging from 10 to 50. We set the complexity of access policy |I | in [5,10,15,20] with the number of files ranging in [5,10,15,20] to assess the time cost in decryption. Fig.…”
Section: B Experimental Analysismentioning
confidence: 99%
See 1 more Smart Citation
“…Motivated by the feature of fine-grained and one-tomany access control of ABE, there are some works designed to integrate ABE into the data security and privacy protection strategy in mobile crowdsensing task distribution. Zhang et al [36] proposed an ABE scheme with direct user revocation, which provides fine-grained access control on the encrypted time-sensitive task message for hierarchical task performers in a mobile crowdsensing system. Xue et al [22] realized fine-grained and forward secure task access control in mobile crowdsensing by integrating ABE with Bloom filter encryption [23].…”
Section: Related Workmentioning
confidence: 99%
“…Inspired by that, the latest research works put forward the solutions for the secure task distribution in mobile crowdsensing. However, there exist some gaps between these theoretically feasible solutions [10,22,24,26,36] and the practicality of mobile crowdsensing. Specifically, first, there is a practical issue that task performers have to locate their desired task among the stored ciphertext before downloading and decryption.…”
Section: Introductionmentioning
confidence: 99%